Keycloak SAML Broken has Authentication Bypass by Primary Weakness
High severity
GitHub Reviewed
Published
Mar 5, 2026
to the GitHub Advisory Database
•
Updated Mar 6, 2026
Package
Affected versions
<= 1.8.1.Final
Patched versions
None
Description
Published by the National Vulnerability Database
Mar 5, 2026
Published to the GitHub Advisory Database
Mar 5, 2026
Last updated
Mar 6, 2026
Reviewed
Mar 6, 2026
A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
A fix is available at https://github.com/keycloak/keycloak/releases/tag/26.5.5.
References